Which of the following should NOT be a part of an organization's policy regarding email attachments?

a. It was an expected attachment.
b. It came from a known source, and the source is confirmed.
c. It appears to be a legitimate business document.
d. None of the above

Answer D. These are all acceptable criteria for an email policy.

Computer Science & Information Technology

You might also like to view...

Prior to becoming a qualified digital forensic investigator, a person must prove their ability as a computer scientist

a. True b. False

Computer Science & Information Technology

Discovering a user's password by observing the keys he or she presses is called which of the following?

a. Password hashing b. Password crunching c. Piggybacking d. Shoulder surfing

Computer Science & Information Technology